General

  • Target

    3600-161-0x0000000000510000-0x00000000010FE000-memory.dmp

  • Size

    11.9MB

  • MD5

    4f1e72524f38929c1b6abeb764d15ced

  • SHA1

    f3272cb66f1f93741350cb83adddf142ea9a01d3

  • SHA256

    aa10edad16d0ea5ddefbdfeecb472d8058c38d66df75c9e2f8b2420c1238c3d9

  • SHA512

    4f7407acd2fa4db937b11817f4bb6d1ad3f8f1b632233543925504ce37ed923465e7c3b2de689ac8df94721ca3ec82945a967d06761432bcbcd43932a0afccde

  • SSDEEP

    98304:8//7c3fPIYjFBN1CzIrQUq5qE1g7xs+hXUUZdo/8MPum7UpJDc:g/7OAO4IrQth1g7x9HojIDc

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.4

Attributes
  • url_path

    /920475a59bac849d.php

Signatures

  • Stealc family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3600-161-0x0000000000510000-0x00000000010FE000-memory.dmp
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections